Home // SENSORCOMM 2011, The Fifth International Conference on Sensor Technologies and Applications // View article


End – to – End Secure Data Delivery in Wireless Sensor Networks

Authors:
Alexandros Zaharis
Leonidas Perlepes
George Stamoulis
Panagiotis Kikiras

Keywords: Security Framework; Sand-boxing; live forensics; cryptography; wireless sensor networks

Abstract:
Typical sensor nodes are resource constrained devices containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A malicious user could easily capture a node and tamper the applications running on it, in order to perform different types of attacks. In this paper, we propose a 3-Tier Security Framework composed by physical security schemes, cryptography of communication channels and live forensics protection techniques that allows for secure WSN deployments. Each of the abovementioned techniques maximizes the security levels leading to a tamper proof sensor node. Even if the physical protection of the nodes is bypassed which is common in wireless sensor attacks, the attacker must surpass 2 more security tiers in order to perform a valid attack on the underlying network. By applying the proposed security framework, secure communication between nodes is guaranteed, identified captured nodes are silenced and their destructive effect on the rest of the network infrastructure is minimized due to the early measures applied. Our main concern is to propose a framework that balances its attributes between robustness, as long as security is concerned and cost effective implementation as far as resources (energy consumption) are concerned.

Pages: 356 to 364

Copyright: Copyright (c) IARIA, 2011

Publication date: August 21, 2011

Published in: conference

ISSN: 2308-4405

ISBN: 978-1-61208-144-1

Location: Nice/Saint Laurent du Var, France

Dates: from August 21, 2011 to August 27, 2011